full transcript

From the Ted Talk by Alessandro Acquisti: What will a future without secrets look like?


Unscramble the Blue Letters


How long a delay do you think we had to add in order to nullify the inhibitory effcet of knowing that faculty would see your answers? Ten minutes? Five minutes? One mntuie? How about 15 seconds? Fifteen seconds were sufficient to have the two groups dsloicse the same amount of information, as if the second group now no longer cares for faculty reading their answers.

Now I have to admit that this talk so far may sunod exceedingly gloomy, but that is not my point. In fact, I want to share with you the fact that there are alternatives. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't care about privacy," consider whether the game has been dsenegid and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already hawalfy through the porescs of being able to protect yourself. When someone tlels you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have cearetd toihcolgeens to allow virtually any electronic transactions to take pcale in a more privacy-preserving manner. We can browse the Internet aonulsmoyny. We can send elmias that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the benefits of big data while protecting privacy. Of course, these technologies ilpmy a shifting of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Open Cloze


How long a delay do you think we had to add in order to nullify the inhibitory ______ of knowing that faculty would see your answers? Ten minutes? Five minutes? One ______? How about 15 seconds? Fifteen seconds were sufficient to have the two groups ________ the same amount of information, as if the second group now no longer cares for faculty reading their answers.

Now I have to admit that this talk so far may _____ exceedingly gloomy, but that is not my point. In fact, I want to share with you the fact that there are alternatives. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't care about privacy," consider whether the game has been ________ and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already _______ through the _______ of being able to protect yourself. When someone _____ you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have _______ ____________ to allow virtually any electronic transactions to take _____ in a more privacy-preserving manner. We can browse the Internet ___________. We can send ______ that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the benefits of big data while protecting privacy. Of course, these technologies _____ a shifting of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Solution


  1. place
  2. disclose
  3. sound
  4. technologies
  5. tells
  6. process
  7. anonymously
  8. emails
  9. imply
  10. created
  11. effect
  12. minute
  13. designed
  14. halfway

Original Text


How long a delay do you think we had to add in order to nullify the inhibitory effect of knowing that faculty would see your answers? Ten minutes? Five minutes? One minute? How about 15 seconds? Fifteen seconds were sufficient to have the two groups disclose the same amount of information, as if the second group now no longer cares for faculty reading their answers.

Now I have to admit that this talk so far may sound exceedingly gloomy, but that is not my point. In fact, I want to share with you the fact that there are alternatives. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't care about privacy," consider whether the game has been designed and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the process of being able to protect yourself. When someone tells you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have created technologies to allow virtually any electronic transactions to take place in a more privacy-preserving manner. We can browse the Internet anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the benefits of big data while protecting privacy. Of course, these technologies imply a shifting of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Frequently Occurring Word Combinations


ngrams of length 2

collocation frequency
social media 5
personal information 3
big data 3
sensitive information 2
billion photos 2



Important Words


  1. add
  2. admit
  3. alternatives
  4. amount
  5. anonymously
  6. answers
  7. benefits
  8. big
  9. browse
  10. care
  11. cares
  12. coming
  13. cost
  14. created
  15. data
  16. delay
  17. designed
  18. disclose
  19. effect
  20. electronic
  21. emails
  22. exceedingly
  23. fact
  24. faculty
  25. fifteen
  26. game
  27. gloomy
  28. group
  29. groups
  30. halfway
  31. hear
  32. holders
  33. imply
  34. incompatible
  35. information
  36. inhibitory
  37. intended
  38. internet
  39. knowing
  40. long
  41. longer
  42. manipulations
  43. manner
  44. mining
  45. minute
  46. minutes
  47. nsa
  48. nullify
  49. occur
  50. order
  51. place
  52. point
  53. privacy
  54. process
  55. protect
  56. protecting
  57. read
  58. reading
  59. realization
  60. recipient
  61. researchers
  62. revenues
  63. rigged
  64. seconds
  65. send
  66. share
  67. shifting
  68. sound
  69. subjects
  70. sufficient
  71. talk
  72. technologies
  73. tells
  74. ten
  75. transactions
  76. virtually
  77. words
  78. years